Professional Documents
Culture Documents
Evaluation Plan :
• In Semester Formative Evaluation : 20%
• In Semester Summative Evaluation : 40%
• End Semester Summative Evaluation : 40%
Introductory to Data Networks and Protocols (CO1_COI_1)
Syllabus 18EC3109-Data Networks and Protocols
Syllabus
CO1: Introduction to Computer networks and Data Link Layer: (10Hours)
Introduction to Computer networks
Data Link Layer
CO2: Network layer and Internetworking: (10Hours)
Internetworking Devices:
Internetworking Technologies:
Networking Protocols:
C03: Transport Layer: (10Hours)
Presentation Layer:
Application Layer:
CO4: Advanced Topics: (09Hours)
Cryptography:
Advancements in Application layer:
Wireless LANs:
Network Security:
C03: Transport Layer: (10Hours)Process to Process Delivery; UDP; TCP; FCP Fibre Channel Protocol; Stream Control
Transmission Protocol (SCTP); Congestion Control: Open Loop, Closed Loop Choke Packets; Quality of Service: Techniques to
Improve QoS: Leaky bucket algorithm, Token bucket algorithm.
Session Layer: ISNS Internet Storage Name Service.
Presentation Layer: SSL, preface of Socket , Secure Socket Layer
Application Layer: Telnet, TFTP, POP3, DNS, SMTP, SNMP, FTP, NTP, SSDP.
Text Books
1) B. A. Frouzan – “Data Communications and Networking (3rd Ed.) “– TMH
2) A. S. Tanenbaum – “Computer Networks (4th Ed.)” – Pearson Education/PHI
3) W. Stallings – “Data and Computer Communications (5th Ed.)” – PHI/ Pearson Education
4) Zheng & Akhtar, Network for Computer Scientists & Engineers, OUP
5) Black, Data & Computer Communication, PHI
6) Miller, data Communication & Network, Vikas
7) Miller, Digital & Data Communication, Jaico
8) Shay, Understanding Data Communication & Network, Vikas
Reference Books
1) Kurose and Rose – “Computer Networking -A top down approach featuring the internet” Pearson Education
2) Leon, Garica, Widjaja – “Communication Networks” – TMH
3) Walrand – “Communication Networks” – TMH.
4) Comer – “Internetworking with TCP/IP, vol. 1, 2, 3(4th Ed.)” – Pearson Education/PHI
7.Images: The images are read by using pixels. These pixels are converted
to binary bit pattern.
8.Auido: These are converted to electrical signals and are then converted
to binary numbers.
9.Video: These are converted to electrical signals and are then converted
to binary numbers.
Half Duplex:
1. In half-duplex transmission, data can flow in either direction -- from the
sending device to the receiving device, and back -- but only in one
direction at a time.
2. Many fax machines, credit card verification systems, and automatic
teller machines use half-duplex transmission.
• OSI:
OSI stands for Open Systems Interconnection.
It specifies standards for communications protocols and
also the functionalities of each layer.
• Protocol:
A protocol is the set of rules or algorithms which define the
way how two entities can communicate across the network
Few of such protocols are TCP, IP, UDP, ARP, DHCP, FTP and
so on.
4. E-Commerce:
• Variety of business and commercial transactions online.
– Eg: Buy or sell items, pay bills, manage bank accounts, pay
taxes, transfer funds and handle investments electronically.
7. VoIP:
• Through this, telephone calls are made digitally using
Internet Protocols.
• Drop line- is the connection b/w the devices and the cable.
Advantages:
• Failure of one node never affects the rest of the network.
• Node expansion is fast and easy.
• Detection of error is an easy process
• It is easy to manage and maintain
Disadvantages:
• It is heavily cabled topology
• If more nodes are added, then its maintenance is difficult
• If the hub or concentrator fails, attached nodes are also
disabled
Hybrid Topology
Devices
Layer Description Popular Protocols Protocol Data Unit operate in
this layer
Path determination IP
Source & Destination logical
Network IPX Packet/Datagram Router
addresses
AppleTalk
Physical addresses LAN
WAN (HDLC, PPP, Frame
Includes 2 layers:
Relay…)
Switch,
Data Link Upper layer: Logical Link Frame
Bridge
Control (LLC)
52
Cont..
The original TCP/IP protocol suite was defined as having four layers: host-to-
network, internet, transport, and application.
However, when TCP/IP is compared to OSI, we can say that the TCP/IP protocol
suite is made of five layers: physical, data link, network, transport, and
application.
Cont..
ICMP-INTERNET CONTROL MESSAGE PROTOCOL
IGMP-INTERNET GROUP MESSAGE PROTOCOL
ARP-ADDRESS RESOLUTION PROTOCOL
RARP-REVERSE ADDRESS RESOLUTION PROTOCOL
TCP-TRANSMISSION CONTROL PROTOCOL
UDP-USER DATAGRAM PROTOCOL
SCTP-STREAM CONTROL TRANSMISSION PROTOCOL
SMTP-SIMPLE MAIL TRANSFER PROTOCOL
FTP-FILE TRANSFER PROTOCOL
HTTP-HYPER TEXT TRANSFER PROTOCOL
DNS-DOMAIN NETWORK SYSTEM
SNMP-SIMPLE NETWORK MANAGEMENT PROTOCOL
TELNET-TELECOMMUNICATIONS NETWORK
Cont..
ICMP (Internet Control Message Protocol)
• It is a mechanism used by the hosts or routers to send notifications
regarding datagram problems back to the sender.
• A datagram travels from router-to-router until it reaches its
destination.
• If a router is unable to route the data because of some unusual
conditions
– ICMP protocol is used to inform the sender that the datagram is undeliverable.
• An ICMP protocol mainly uses two terms:
– ICMP Test: ICMP Test is used to test whether the destination is reachable or not.
– ICMP Reply: ICMP Reply is used to check whether the destination device is
responding or not.
• The core responsibility of the ICMP protocol is to report the problems,
not correct them..
• ICMP can send the messages only to the source, but not to the
intermediate routers
Cont..
IGMP-INTERNET GROUP MESSAGE PROTOCOL
• Used for simultaneous transmission of a message to a group of
recipients
• Routers ask nodes if they need a particular multicast stream (IGMP
query).
• Nodes respond to the router if they are seeking a particular multicast
stream (IGMP reports).
ARP-ADDRESS RESOLUTION PROTOCOL
• ARP finds the physical address by using the IP address.
• In a network, each device is known as physical address usually
imprinted on Network interface card (NIC).
Cont..
REVERSE ADDRESS RESOLUTION PROTOCOL (RARP)
• RARP protocol helps to find the internet address of a device whose
physical address is known.
USER DATAGRAM PROTOCOL (UDP)
• UDP is a process to process protocol used for data transmission.
• It takes the data from upper layer of TCP/IP Model and adds following
information to the data:
a) Port Address – Source port address of 16 bits and destination port address of 16 bits
added to the data so that it reaches to correct destination
b) checksum error control – 16 bits of checksum data is added to the data received from
upper layer, this is used for error control.
c) length of data – Length defines the total bytes of data in datagram.
• Although this protocol finds the error in the transmission of data,
• Doesn’t specify the error which makes it hard to identify the actual
error in transmission.
Cont..
Transmission control protocol (TCP)
• Unlike UDP which is a connectionless protocol, the TCP is a connection
oriented protocol.
• A connection must be made between sender and receiver before the
transmission of data.
• TCP protocol divides the data in small units called segments.
– Makes it possible to rearrange the segments in correct order at the receiver side to
make the complete data.
• Also adds acknowledgement number to the segments
• Unlike UDP which is unable to specify the exact error in transmission.
Cont..
STREAM CONTROL TRANSMISSION PROTOCOL (SCTP)
• This protocol combines the best features of TCP and UDP protocols.
• It was discovered later to support newer applications such as voice
data transmission over the internet.
HYPERTEXT TRANSFER PROTOCOL(HTTP)
• Allows the user to interact with world wide web through the browser
application.
• HTTP can be used to transfer various types of data such as plain text,
audio, video etc.
FILE TRANSFER PROTOCOL (FTP)
• This protocol is used for transmitting files from one system to another
system.
Cont..
TELYTYPE NETWORK (TELNET)
• It is a client-server protocol.
• It is a type of protocol that enables one computer to connect to
local computer.
• This protocol is used on internet or on LAN to provide a bidirectional
communication
DOMAIN NAME SYSTEM (DNS)
• It provides a mapping between the name of a host on the network and
its numerical address
Simple Network Management Protocol (SNMP)
• It managers the devices connected to the internet using TCP/IP
protocol.
Simple mail transfer protocol(SMTP)
• Used for email services
• It is a set of communication guidelines that allow software to transmit
an electronic mail over the internet
TCP/IP ADDRESSING
Physical Addresses
• The physical address, also known as the link address, is the address of
a node as defined by its LAN or WAN.
• The size and format of these addresses vary depending on the network.
For example, Ethernet uses a 6-byte (48-bit) physical address.
• Physical addresses can be either unicast (one single recipient),
multicast (a group of recipients), or broadcast (to be received by all
systems in the network.
• Example: Most local area networks use a 48-bit (6-byte) physical
address written as 12 hexadecimal digits; every byte (2 hexadecimal
digits) is separated by a colon, as shown below: A 6-byte (12
hexadecimal digits) physical address 07:01:02:01:2C:4B
Cont..
Logical Addresses
• To allow packets to be independent of the physical connection of the
network
• A logical address in the Internet is currently a 32-bit address that can
uniquely define a host connected to the Internet.
• An internet address in IPv4 in decimal numbers 132.24.75.9
• No two publicly addressed and visible hosts on the Internet can have
the same IP address.
• The physical addresses will change from hop to hop, but the logical
addresses remain the same.
• The logical addresses can be either unicast (one single recipient),
multicast (a group of recipients), or broadcast (all systems in the
network). There are limitations on broadcast addresses.
Cont..
Port Addresses
• There are many application running on the computer. Each application
run with a port no.(logically) on the computer.
• A port number is part of the addressing information used to identify
the senders and receivers of messages.
• Port numbers are most commonly used with TCP/IP connections.
• These port numbers allow different applications on the same computer
to share network resources simultaneously.
• The physical addresses change from hop to hop, but the logical and
port addresses usually remain the same.
• Example: a port address is a 16-bit address represented by one decimal
number 753
Cont..
Application-Specific Addresses
• Some applications have user-friendly addresses that are designed for
that specific application.
• Examples include the e-mail address (for
example, forouzan@fhda.edu) and the Universal Resource Locator
(URL) (for example, www.mhhe.com).
• The first defines the recipient of an e-mail; the second is used to find a
document on the World Wide Web.
Note
Performance
• It measures how well a network can support communication between
two nodes in the Network
• The two major tasks in a network are the Transmission and
reception of information.
• We need to focus on how fast a message is transmitted and how fast
a node can receive a request and find the needed information.
• To measure the performance of a network, here are the major factors
to be considered:
1. Transit time:
The total time a node takes to transmit a message from the beginning
until the last character of the message.
Cont..
Bit Rate
• The number of bit intervals per second is known as the bit rate.
• Time it takes to transport one single bit is referred to as the bit interval.
• In layman's terms, bit rate refers to the number of bits transferred
every second, which is commonly stated in bits per second (bps).
– For example, Kilobits per second (Kbps), Megabits per second (Mbps), Gigabits
per second (Gbps), etc.
Baud Rate
• The number of times a signal can change on a transmission line
• Baud rate equal to the number of bits per second that can be
transferred.
– For example, the 1500 baud rate indicates that the channel state can change up
to 1500 times per second.
Cont..
Bit Rate Baud Rate
The number of bits per second is known The number of signal units per second is
as the bit rate. known as the baud rate.
Bit rate determines the number of bits Baud Rate determines the number of times a
travelled per second. signal's status changes.
Bit rate= baud rate x the count of bits Baud rate= bit rate/ the number of bits per
per signal unit. signal unit.
Bit Rate cannot determine the It can determine the amount of bandwidth
bandwidth. necessary to send the signal.
Cont..
Coaxial Cable
• Copper is mainly used in the central conductor
• Surrounded by a PVC installation
• Outer part is used as a shield against the noise
• The outermost part is a plastic cover which is used to
protect the overall cable
• It was used in the analog communication systems
• Cable TV network providers also widely use the Coaxial
cable in the entire TV network.
Cont..
Twisted Pair Cable:
Cont..
• It is cheap and is easier to install than coaxial cables.
• It consists of two conductors (commonly copper is used)
• One is grounded and the other is used to carry signals from
the sender to the receiver.
• Separate pairs are used for sending and receiving.
• Two types of twisted pair cables
– Unshielded twisted pair
– Shielded twisted pair
The refractive index of the core is The refractive index of the core is
uniform made to vary gradually such that it
is maximum at the center of the core
The diameter of the core is about The diameter of the core is about
50-200μm 50μm
The path of light propagation is zig- The path of light is helical in manner
zag in manner
Router
• To connect many types of networks at the same time using adaptive
(Dynamic) and non-adaptive routing.
• Connected to at least two networks and decides how to deliver each
data packet.
• If a packet is traveling to the LAN, the router bounces it back. The
packet will be toured depending on the routing table.
Cont..
Hub
• A hub is a simple and cheap
networking device
• When a hub receives a data packet
(an Ethernet frame) from a network
device at one of its ports, it
broadcasts (repeats) the packet to all
of its ports,i.e, to all other network
devices.
• A collision occurs when two network
devices on the same network try to
send packets at the same time.
SWITCH
• Technique of transferring the information from one computer network
to another network is known as switching.
• Switching in a computer network is achieved by using switches.
• A switch is a small hardware device which is used to join multiple
computers together with one local area network (LAN).
• Network switches operate at layer 2 (Data link layer) in the OSI model.
• Switching is transparent to the user and does not require any
configuration in the home network.
• Switches are used to forward the packets based on MAC addresses.
Cont..
• Transfer the data only to the device that has been addressed.
• It is operated in full duplex mode.
• Packet collision is minimum as it directly communicates between
source and destination.
• It does not broadcast the message as it works with limited bandwidth.
Why Switching Concept required?
• Switching concept is developed because of the following reasons:
• Bandwidth: It is defined as the maximum transfer rate of a cable.
• Collision: When more than one device transmits the message over the
same physical media, and they collide with each other.
– To overcome this problem, switching technology is implemented so that
packets do not collide with each other.
Cont..
• In large networks, there can be multiple paths from sender to receiver.
• The switching technique will decide the best route for data
transmission.
• Switching technique is used to connect the systems for making one-to-
one communication.
STRUCTURE OF A SWITCH
• Switched network: Series of interlinked nodes, called
switches.
Store-and-forward
• Receives the data frame and then checks for errors before forwarding
the packets.
• It supports the efficient transmission of non-corrupted frames.
– Used in telecommunication networks.
• The switching device waits to receive the entire frame and then stores
the frame in the buffer memory.
• Then the frame is checked for errors by using CRC(Cyclic Redundancy
Check)
Cont..
Cont..
Cut-through Switching:
• Forwards the packets as soon as the destination address is available
without waiting for the rest of the data to arrive.
• It supports low latency and high-speed transmission and requires less
storage space.
• It is used in fiber channel transmission, SCSI traffic transmission, etc.
• Data transmission starts as soon as the destination address field
arrives at the switching device.
• Performs a lookup operation to check the address
• Validate and the linked transmitted packets to the destination
• It will not wait for the rest of the frame to arrive.
Cont..
Cont..
Sl.No Store-and-Forward Switching Cut-through Switching
It has a high latency rate as the device waits for It has a low latency rate as the device does not wait for
6
the entire frame to be received the entire frame
Cont..
Fragment-free Switching
• It is an advanced technique of the Cut-through Switching.
• Reads at least 64 bytes of a frame before forwarding to the next node to
provide the error-free transmission.
• It combines the speed of Cut-through Switching with the error
checking functionality.
• A collision is detected within 64 bytes of the frame, the frames which
are collided will not be forwarded further.
Cont..
Cont..
CIRCUIT-SWITCHED NETWORKS
• Once the connection is established then the dedicated path will remain
to exist until the connection is terminated.
• Any user wants to send the data, voice, video, a request signal is sent to
the receiver then the receiver sends back the acknowledgment to ensure
the availability of the dedicated path.
Types of Modem
• External Modem
• Internal modem
• Wireless Modem
• Dial-up Modem
• Cable Modem
• DSL Modem
• Half duplex and full duplex Modems
• 2 wire modem
• Asynchronous & Synchronous Modems
Cont..
DSL Modem
• DSL stands for Digital Subscriber Line that allows the transmission of
data over the normal telephone line.
• It provides a high data transmission speed, hence widely used in
offices/homes.
• It can be used to connect to a computer or router to provide the
internet connection through the ethernet port or USB port.
• The DSL modems are of two types:
– ADSL (Asymmetric Digital Subscriber Line) Modem
– SDSL (Symmetric Digital Subscriber Line) Modem
Cont..
Cont..
1. Directional capacity: half duplex modem and full duplex modem.
2. Connection to the line: 2-wire modem and 4-wire modem.
3. Transmission mode: asynchronous modem and synchronous modem.
Half duplex
• A half duplex modem permits transmission in one direction at a time.
• If a carrier is detected on the line by the modem, It indicates the
incoming carrier to the DTE (Data Terminal Equipment) through a
control signal of its digital interface.
• Modem does not give permission to the DTE to transmit data.
Cont..
Full duplex
• A full duplex modem allows simultaneous transmission in both
directions.
• Two carriers on the line, one outgoing and the other incoming. Wire
and 4-wire Modems
• In a 4-wire connection, one pair of wires is used for the outgoing
carrier and the other pair is used for incoming carrier.
• Full duplex and half duplex modes of data transmission are possible on
a 4- wire connection.
• As the physical transmission path for each direction is separate, the
same carrier frequency can be used for both the directions.
Cont..
Cont..
Asynchronous Modem
• Asynchronous modems can handle data bytes with start and stop bits.
• There is no separate timing signal or clock between the modem and the
DTE.
• The internal timing pulses are synchronized repeatedly to the leading
edge of the start pulse
Cont..
Synchronous Modem
• Synchronous modems can handle a continuous stream of data bits but
requires a clock signal.
• The data bits are always synchronized to the clock signal.
• There are separate clocks for the data bits being transmitted and
received.
• For synchronous transmission of data bits, the DTE can use its internal
clock and supply the same to the modem
Trunks
• Trunks are a large-bandwidth communication channels connecting
switching centers.
• A trunk comprises of a cluster of broadcast frequencies that are
suitable for long haul communication of many voice and data signals
simultaneously.
The characteristic features of a trunk are
• Designed for both voice and data transmission.
• Carry millions of calls simultaneously over long distances.
• High bandwidth.
• Comprise of a cluster of fiber optic cables bundled together to
maximize bandwidth.
• Another method of achieving high bandwidth is to use a single high
capacity link that can carry many signals multiplexed together.
Multiplexing
What is Multiplexing?
• Used to combine and send the multiple data streams over a single
medium.
• The process of combining the data streams is known as multiplexing
– Hardware used for multiplexing is known as a multiplexer.
• Multiple bits error − In the received frame, more than one bits are
corrupted.
Cont..
• Burst error − In the received frame, more than one consecutive bits
are corrupted.
Error Control
• Error control can be done in two ways
• Error detection − Error detection involves checking whether any
error has occurred or not.
– The number of error bits and the type of error does not matter.
• Error correction − Error correction involves ascertain the exact
number of bits that has been corrupted and the location of the
corrupted bits.
Cont..
• Basic approach used for error detection is the use of redundancy bits,
where additional bits are added to facilitate detection of errors.
• Some popular techniques for error detection are:
1. Simple Parity check
2. Two-dimensional Parity check
3. Checksum
4. Cyclic redundancy check
1. Simple Parity check
• Blocks of data from the source are subjected to a check bit or parity bit
generator form, where a parity of :
• 1 is added to the block if it contains odd number of 1’s, and
• 0 is added if it contains even number of 1’s
• This scheme makes the total number of 1’s even, that is why it is called
even parity checking.
Cont..
Cont..
Two-dimensional Parity check
• Parity check bits are calculated for each row, which is equivalent to a
simple parity check bit.
• Parity check bits are also calculated for all columns, then both are sent
along with the data.
• At the receiving end these are compared with the parity bits calculated
on the received data.
Cont..
Checksum
• In the sender’s end the segments are added using 1’s complement
arithmetic to get the sum. The sum is complemented to get the
checksum.
• At the receiver’s end, all received segments are added using 1’s
complement arithmetic to get the sum. The sum is complemented.
2. Go – Back – N ARQ
• Sending multiple frames before receiving the ack for the first frame.
• It uses the concept of sliding window, and so is also called sliding
window protocol.
• The frames are sequentially numbered and a finite number of frames
are sent.
• Ack of a frame is not received within the time period, frame are
retransmitted.
Cont..
Cont..
Cont..
3. Selective Repeat ARQ
Flow Control in Data Link Layer
Flow Control is classified into two categories:
• Length Field − Here, a length field is used that determines the size of
the frame. It is used in Ethernet (IEEE 802.3).
• Controls when and how each node can transmit in the wireless channel
Persistent CSMA
Non-persistent CSMA
P-Persistent CSMA
• With the probability q=l-p, the station then waits for the
beginning of the next time slot.
Cont..
• If the next slot is also idle, it either transmits or waits again with
probabilities p and q.
• This process is repeated till either frame has been transmitted
Cont..
CSMA/CD
Fixed Assigned MAC Protocol
(Channelization)
• Schedule nodes onto different sub-channels
• Collision-Free
Ans.
Given Image is: 1024*768*3 Bytes
=2,359,296 Bytes 2,359,296*8=18,874,368 Bit.
(i) How long does it take to transmit it over a 56 kbps modem channel
Transmission Delay= Message Size/ BandWidth
=18,874,368/56Kbps=337.042 Sec
(ii) How long does it take to transmit it over a 1Mbps modem channel?
= 18,874,368/1 Mbps=18.87 Sec
Cont..
Consider a source computer S transmitting a file of size 106 bits to
a destination computer D over a network of two routers R1 and
R2 and three links L1, L2 and L3. L1 connects between S and R1;
L2 connects R1 and R2, and L3 connects R2 and D. Let length of
each link be 100Km and signal travels at a speed of 10^8m/sec. If
the file broken into 1000 packets each of size 1000bits. Find the
total sum of transmission and propagation delays in transmitting
the file form S to D. Assume the bandwidth of the channel is
1Mbps.
P-T-O
Cont..
(i) Propagation delay to travel from S to R1 (P) = (Distance) / (Link Speed)
=100Km/10^8 m/sec
= 10^5/10^8 = 1ms
Hence, the total time taken to transmit the first packet from source to
destination is Propagation delay(P)+Transmission Delay(T)= 3+3 ms=6ms
The first packet will take 6ms to reach D.
While first packet was reaching D, other packets must have been processing
in parallel. So, D will receive remaining packets 1 packet per 1 ms from R2.
So, remaining 999 packets will take 999 ms. And total time will be
999 + 6 = 1005 ms
Cont..
Calculate the latency (from first bit sent to last bit received) for
the following: (a) 10-Mbps Ethernet with a single store-and-
forward switch in the path, and a packet size of 5000 bits. Assume
that each link introduces a propagation delay of 10 μs and that the
switch begins retransmitting immediately after it has finished
receiving the packet. (b) Same as (a) but with three switches.
Ans.
Total Transmission delay (T) = (Number of Bits) / Bandwidth
Transmission time=5000/10*10^6= 500 Micro sec
Each link introduces a propagation delay of 10 μs
Hence time to reach the packet is 500 μs + 10 μs = 510 μs
then from switch to destination=510 μs
a) For one switch 2 link means
=500+500+10+10
So total latency =1020 μs
b) For 3 switches =510*4=2040 us (as packet must go over 4 links)
Cont..
Hosts A and B are each connected to a switch S via 10-Mbps links
as in shown in figure below. The propagation delay on each link is
20 μs. S is a store-and forward device; it begins retransmitting a
received packet 35 μs after it has finished receiving it. Calculate
the total time required to transmit 10,000 bits from A to B. (a) as a
single packet (b) as two 5000-bit packets sent one right after the
other b) Illustrate networking devices?
20 μs 20 μs
Cont..
Propagation Delay (P)= 20 microseconds
Total Transmission delay (T) = (Number of Bits) / Bandwidth
=10000/10*10^6 μs
= 1000 μs
Time to reach
the packet to = Total Transmission delay (T) + Propagation delay on each link
switch
= 1000 μs+ 20 μs
= 1020 μs
The Packet is retransmitted by after 35 Seconds by the switch
= 1020 μs + 35 μs
= 1055 μs
P-T-O
Cont..
Time to reach the packet to Node B = (Packet is retransmitted by after 35
Seconds by the switch + Total Transmission delay (T) + Propagation Delay
(P)
(ii) We compute T = 5000/10*10^6 = 500 micro sec. The rst packet reaches the
switch in 520 micro sec. After 35 micro sec. of switch delay, the switch
retransmits packet 1 which reaches B at 520 + 35 + 520 = 1075 micro sec.
Immediately after the transmission of the rst packet, A sends the second
packet which reaches the switch at 1020 micro sec. While A transmits
Packet 2 (and the switch is receiving on one end), the switch is
retransmitting Packet 1 on the other end. The switch retransmits the
second one after 35 micro sec. i.e., at 1055 micro sec, Packet 2 is ready to
leave the switch. Note that at 1055 micro sec., the last bit of the rst packet
has finished its transmission from the switch and is in the transmission
channel. Hence, after 1055 micro sec., the switch could retransmit the
second packet without any issues. Therefore, at 1055 + 520 = 1575 micro
sec., Packet 2 is received at B. The transmission is complete at 1575 micro
sec. P-T-O
Cont..